Joke Collection Website - Public benefit messages - How to remedy the leakage of mobile phone information

How to remedy the leakage of mobile phone information

What should I do if my mobile phone leaks personal information?

1. What should I do if my mobile phone leaks personal information?

Personal information is leaked by mobile phones, and the following remedial measures are suggested:

1, change important password

Nowadays, people can't live without the Internet. Once personal information is leaked, it involves a wide range. Especially for people who like online shopping, personal information is often associated with important information such as bank account number and password. Therefore, once personal information is leaked, important passwords should be changed immediately to avoid economic losses.

Step 2 report the case

Once personal information is leaked, you should call the police. The purpose of reporting a case is to protect one's own rights and interests, and the other is to file a case. Once more people encounter similar situations to yours, they can deal with them together. This can not only protect your privacy, but also avoid more economic losses.

3. Lawyers sue

If important personal information is lost and you know how to lose it or have many clues, you can consult relevant laws and regulations with professional lawyers. If the lawyer gives a positive answer, he can use legal weapons to safeguard his rights and interests.

Step 4 collect evidence

After the information is leaked, it is easy to receive all kinds of emails and phone calls from all over the world. At this time, you should pay attention and write down useful information such as the phone number or email address of the other party. Perhaps this information is trivial, but once collected, it can not only help you defend your rights, but also help more people.

5. Remind friends and relatives around you to prevent being cheated.

After personal information is leaked, you can not only use this information to steal your account, but also deceive your relatives and friends. So once your information is leaked or your contact tool account number is lost, you must inform your relatives and friends at the first time and ask them to take extra precautions to avoid being deceived.

Second, how to prevent mobile phones from revealing personal information

Information security is no small matter. Once the privacy and secrets of individuals, units and countries are leaked, it will often cause many adverse effects on society. The weak awareness of personal information security and the nonstandard industry reflected by various information leakage incidents also make us more aware of the importance of mobile phone information security to the national economy and people's livelihood.

To prevent mobile phone information from leaking, ordinary users are not powerless. As long as we strengthen the awareness of information security and confidentiality, master the common sense and skills of mobile phone security protection, learn to use mobile phones scientifically, and reduce or even eliminate the disclosure of personal information, it is entirely possible.

First of all, we must put an end to carelessness and luck.

At present, many people can only use mobile phones, but they don't know much about the destruction of information data of mobile phone memory cards, hidden dangers of mobile phone information security and technical loopholes. Therefore, we must put an end to paralysis and fluky psychology, strengthen our study, effectively recognize all kinds of security risks in the process of using mobile phones, recognize the ways and means of leaking personal information by mobile phones, fully realize the serious consequences of mobile phone leakage, and let mobile phones "sound the alarm bell" to prevent leakage.

Second, we must master the common sense of safety precautions.

For special people, special places and special content, special mobile phone management methods should be used. For secret-related personnel, such as military personnel and confidential personnel, it is necessary to formulate a strict mobile phone management and use system, or distribute special mobile phones with strong confidentiality, so that special planes can be used exclusively. For confidential places, mobile phone security equipment should be set up in accordance with the confidentiality provisions. Don't carry and use mobile phones in confidential places, and don't use mobile phones to record, video, photograph and transmit confidential content.

At the same time, don't easily answer and receive phone calls, short messages, multimedia messages and emails from strangers. If necessary, turn off the mobile phone and completely cut off the power supply of the mobile phone to prevent being implanted with viruses or Trojans.

Don't set the phone to log in automatically, and enter the password every time you log in. We should make full use of the pattern and password lock function of the mobile phone to prevent others from unlocking the screen and peeping into personal privacy. Smartphone users should cancel the login status of their mobile phone accounts in time after using network services. It is also necessary to delete potentially sensitive information regularly and timely.

Third, strictly abide by the confidentiality provisions.

Confidentiality clause not only plays an inestimable role in protecting enterprise data, business secrets and even national security, but also helps to protect personal privacy. To this end, we must earnestly abide by the confidentiality provisions, especially do not store or process important confidential information in mobile phones, and put an end to the occurrence of leaks from the source. It is necessary to avoid revealing relevant important information in letters, WeChat, QQ and emails. Don't store sensitive information such as the work unit and position of the core personnel in the mobile phone. You can also use abbreviations or code names to avoid the complete exposure of important and sensitive information.

Fourth, use the formal platform to download software.

When downloading software, smartphone users should log on to the official platform to avoid downloading in the forum. Don't use unknown software, don't browse bad web pages. Insist on repairing mobile phones in regular mobile phone operators to prevent being implanted with virus programs. When installing the software, be sure to check the permission list requested by the software in detail, and be especially vigilant when sensitive permissions appear. If the software requires an address book, short message, etc. unrelated to the service. , or install a reader program but require access to the camera, you should be alert to whether there is a trap.

Fifth, strictly control the system authority.

Mobile phone users should establish risk awareness and try to avoid granting access to personal privacy and network to suspicious programs at the same time. Functions that are not usually used or rarely used, such as Bluetooth, infrared, mobile phone positioning, high-definition camera, etc. , should be turned off or stopped, so as to prevent the mobile phone from being attacked remotely or searched by viruses, and then turned on when these functions are needed. When using WIFI for free, only use the network you know and trust, and don't send important personal information easily.

Sixth, completely delete unnecessary information.

When the user deletes or formats the information in the mobile phone storage medium, the information is not really erased, but the main boot area information is deleted, its control structure is modified, and it is marked as rewritable. When new information is stored, the original information can be overwritten, but when it is not overwritten, as long as it is not destroyed for physical reasons, the information remains in the storage medium and can be recovered. Therefore, when changing a mobile phone or deleting related information, you can choose mobile phone software with data shredding function, or after formatting the mobile phone, repeatedly store a large number of useless data such as movies, junk files and pictures in the memory of the mobile phone, and then delete these information repeatedly, so that invalid information fills the space of the mobile phone repeatedly, completely covering the original information, and increasing the difficulty of data recovery. In addition, old mobile phones should not be transferred or sold at will, and should be physically destroyed to avoid the risk of revealing privacy.

In addition, a plurality of mobile phones can be used to physically separate mobile phones used for work and personal communication from mobile phones used for online entertainment. As far as possible, information such as address book and short message will be stored in the SIM card, and files such as photos and pictures will be stored in the external memory outside the mobile phone to reduce the risk of information leakage.

The above knowledge is my answer to the question "What should I do if my mobile phone leaks personal information?". If you need more legal help,